MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 e9da8094392d8124c615595ebabc8e3ce15c94922c7f5540e12974eee9113a86. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
AgentTesla
Vendor detections: 16
| SHA256 hash: | e9da8094392d8124c615595ebabc8e3ce15c94922c7f5540e12974eee9113a86 |
|---|---|
| SHA3-384 hash: | cffb5bc32fc99ca5f977ba001ca084deeff6767b10e762fd62dbd230ab4f872ba8884f0598adf372cbf281a3aa3e9ee8 |
| SHA1 hash: | 85fe17228281359a29151103b8e634c42c238d13 |
| MD5 hash: | f5c893339a725f798727c733c4d567f2 |
| humanhash: | music-hydrogen-yellow-black |
| File name: | DEKONT2024-01-12-9876678909876567800009876-DOC.exe |
| Download: | download sample |
| Signature | AgentTesla |
| File size: | 645'632 bytes |
| First seen: | 2024-01-12 13:12:44 UTC |
| Last seen: | 2024-01-19 14:43:33 UTC |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | f34d5f2d4577ed6d9ceec516c1f5a744 (48'648 x AgentTesla, 19'452 x Formbook, 12'201 x SnakeKeylogger) |
| ssdeep | 12288:ldebOkkiOCoL8DwjScwOEibfpN3N/m91JYrGRNCwZdgh:OH8VgwjScLVbfXo+rGRNju |
| TLSH | T155D41202F26887B1C6764BF0453D99818B767057B4B3E3C82DEAB4EF25B27448796B13 |
| TrID | 63.0% (.EXE) Generic CIL Executable (.NET, Mono, etc.) (73123/4/13) 11.2% (.SCR) Windows screen saver (13097/50/3) 9.0% (.EXE) Win64 Executable (generic) (10523/12/4) 5.6% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2) 3.8% (.EXE) Win32 Executable (generic) (4505/5/1) |
| Reporter | |
| Tags: | AgentTesla exe geo TUR |
Intelligence
File Origin
NLVendor Threat Intelligence
Result
Behaviour
Result
Details
Result
Signature
Behaviour
Result
Behaviour
Unpacked files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 Signatures
MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.
| Rule name: | AgentTeslaV2 |
|---|---|
| Author: | ditekshen |
| Description: | AgenetTesla Type 2 Keylogger payload |
| Rule name: | AgentTeslaV3 |
|---|---|
| Author: | ditekshen |
| Description: | AgentTeslaV3 infostealer payload |
| Rule name: | AgentTesla_DIFF_Common_Strings_01 |
|---|---|
| Author: | schmidtsz |
| Description: | Identify partial Agent Tesla strings |
| Rule name: | INDICATOR_EXE_Packed_GEN01 |
|---|---|
| Author: | ditekSHen |
| Description: | Detect packed .NET executables. Mostly AgentTeslaV4. |
| Rule name: | INDICATOR_SUSPICIOUS_Binary_References_Browsers |
|---|---|
| Author: | ditekSHen |
| Description: | Detects binaries (Windows and macOS) referencing many web browsers. Observed in information stealers. |
| Rule name: | INDICATOR_SUSPICIOUS_EXE_References_Confidential_Data_Store |
|---|---|
| Author: | ditekSHen |
| Description: | Detects executables referencing many confidential data stores found in browsers, mail clients, cryptocurreny wallets, etc. Observed in information stealers |
| Rule name: | INDICATOR_SUSPICIOUS_EXE_References_Messaging_Clients |
|---|---|
| Author: | ditekSHen |
| Description: | Detects executables referencing many email and collaboration clients. Observed in information stealers |
| Rule name: | INDICATOR_SUSPICIOUS_EXE_Referenfces_File_Transfer_Clients |
|---|---|
| Author: | ditekSHen |
| Description: | Detects executables referencing many file transfer clients. Observed in information stealers |
| Rule name: | INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID |
|---|---|
| Author: | ditekSHen |
| Description: | Detects executables referencing Windows vault credential objects. Observed in infostealers |
| Rule name: | malware_Agenttesla_type2 |
|---|---|
| Author: | JPCERT/CC Incident Response Group |
| Description: | detect Agenttesla in memory |
| Reference: | internal research |
| Rule name: | MALWARE_Win_AgentTeslaV2 |
|---|---|
| Author: | ditekSHen |
| Description: | AgenetTesla Type 2 Keylogger payload |
| Rule name: | NET |
|---|---|
| Author: | malware-lu |
| Rule name: | NETexecutableMicrosoft |
|---|---|
| Author: | malware-lu |
| Rule name: | pe_imphash |
|---|
| Rule name: | Skystars_Malware_Imphash |
|---|---|
| Author: | Skystars LightDefender |
| Description: | imphash |
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Malspam
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.